Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://www.amtso.org/check-desktop-phishing-page/

Overview

General Information

Sample URL:https://www.amtso.org/check-desktop-phishing-page/
Analysis ID:1558601
Infos:
Errors
  • URL not reachable

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample

Classification

  • System is w10x64
  • chrome.exe (PID: 3128 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 1028 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 --field-trial-handle=2540,i,10637750178900009282,3332602394498144869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 6528 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.amtso.org/check-desktop-phishing-page/" MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://www.amtso.org/check-desktop-phishing-page/Avira URL Cloud: detection malicious, Label: phishing
Source: unknownTCP traffic detected without corresponding DNS query: 20.223.36.55
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.amtso.org
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: classification engineClassification label: mal48.win@17/0@4/4
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 --field-trial-handle=2540,i,10637750178900009282,3332602394498144869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.amtso.org/check-desktop-phishing-page/"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 --field-trial-handle=2540,i,10637750178900009282,3332602394498144869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
1
Process Injection
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://www.amtso.org/check-desktop-phishing-page/100%Avira URL Cloudphishing
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0014.t-0009.t-msedge.net
13.107.246.42
truefalse
    high
    www.google.com
    142.250.185.228
    truefalse
      high
      amtso.org
      160.153.0.9
      truefalse
        unknown
        www.amtso.org
        unknown
        unknownfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          142.250.185.228
          www.google.comUnited States
          15169GOOGLEUSfalse
          239.255.255.250
          unknownReserved
          unknownunknownfalse
          160.153.0.9
          amtso.orgUnited States
          21501GODADDY-AMSDEfalse
          IP
          192.168.2.4
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1558601
          Start date and time:2024-11-19 16:12:39 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 27s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:browseurl.jbs
          Sample URL:https://www.amtso.org/check-desktop-phishing-page/
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal48.win@17/0@4/4
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • URL browsing timeout or error
          • URL not reachable
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 142.250.186.67, 142.250.185.110, 66.102.1.84, 172.217.18.3, 216.58.206.67
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, accounts.google.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, azureedge-t-prod.trafficmanager.net, clients.l.google.com, www.gstatic.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: https://www.amtso.org/check-desktop-phishing-page/
          No simulations
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          No static file info
          TimestampSource PortDest PortSource IPDest IP
          Nov 19, 2024 16:13:36.445230961 CET49734443192.168.2.420.223.36.55
          Nov 19, 2024 16:13:37.414022923 CET4973580192.168.2.4199.232.214.172
          Nov 19, 2024 16:13:41.429652929 CET4973580192.168.2.4199.232.214.172
          Nov 19, 2024 16:13:46.843925953 CET49741443192.168.2.4160.153.0.9
          Nov 19, 2024 16:13:46.843992949 CET44349741160.153.0.9192.168.2.4
          Nov 19, 2024 16:13:46.844053030 CET49741443192.168.2.4160.153.0.9
          Nov 19, 2024 16:13:46.844417095 CET49742443192.168.2.4160.153.0.9
          Nov 19, 2024 16:13:46.844476938 CET44349742160.153.0.9192.168.2.4
          Nov 19, 2024 16:13:46.844532967 CET49742443192.168.2.4160.153.0.9
          Nov 19, 2024 16:13:46.844656944 CET49741443192.168.2.4160.153.0.9
          Nov 19, 2024 16:13:46.844666004 CET44349741160.153.0.9192.168.2.4
          Nov 19, 2024 16:13:46.845094919 CET49742443192.168.2.4160.153.0.9
          Nov 19, 2024 16:13:46.845117092 CET44349742160.153.0.9192.168.2.4
          Nov 19, 2024 16:13:49.039633989 CET49745443192.168.2.4142.250.185.228
          Nov 19, 2024 16:13:49.039676905 CET44349745142.250.185.228192.168.2.4
          Nov 19, 2024 16:13:49.039753914 CET49745443192.168.2.4142.250.185.228
          Nov 19, 2024 16:13:49.039984941 CET49745443192.168.2.4142.250.185.228
          Nov 19, 2024 16:13:49.040004015 CET44349745142.250.185.228192.168.2.4
          Nov 19, 2024 16:13:49.431272984 CET4973580192.168.2.4199.232.214.172
          Nov 19, 2024 16:13:49.918153048 CET49746443192.168.2.4184.28.90.27
          Nov 19, 2024 16:13:49.918210030 CET44349746184.28.90.27192.168.2.4
          Nov 19, 2024 16:13:49.918307066 CET49746443192.168.2.4184.28.90.27
          Nov 19, 2024 16:13:49.919894934 CET49746443192.168.2.4184.28.90.27
          Nov 19, 2024 16:13:49.919929028 CET44349746184.28.90.27192.168.2.4
          Nov 19, 2024 16:13:52.911281109 CET49747443192.168.2.44.245.163.56
          Nov 19, 2024 16:13:52.911339045 CET443497474.245.163.56192.168.2.4
          Nov 19, 2024 16:13:52.911515951 CET49747443192.168.2.44.245.163.56
          Nov 19, 2024 16:13:52.912878036 CET49747443192.168.2.44.245.163.56
          Nov 19, 2024 16:13:52.912904024 CET443497474.245.163.56192.168.2.4
          Nov 19, 2024 16:13:55.446634054 CET4974880192.168.2.4199.232.210.172
          Nov 19, 2024 16:13:56.448537111 CET4974880192.168.2.4199.232.210.172
          Nov 19, 2024 16:13:58.451386929 CET4974880192.168.2.4199.232.210.172
          Nov 19, 2024 16:14:02.452378035 CET4974880192.168.2.4199.232.210.172
          Nov 19, 2024 16:14:10.463733912 CET4974880192.168.2.4199.232.210.172
          Nov 19, 2024 16:14:16.500984907 CET4975080192.168.2.4199.232.214.172
          Nov 19, 2024 16:14:16.852319956 CET49741443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:16.852441072 CET49742443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:16.895343065 CET44349742160.153.0.9192.168.2.4
          Nov 19, 2024 16:14:16.895390034 CET44349741160.153.0.9192.168.2.4
          Nov 19, 2024 16:14:17.512593985 CET4975080192.168.2.4199.232.214.172
          Nov 19, 2024 16:14:18.108900070 CET49753443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:18.108962059 CET44349753160.153.0.9192.168.2.4
          Nov 19, 2024 16:14:18.109047890 CET49753443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:18.109163046 CET49754443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:18.109230042 CET44349754160.153.0.9192.168.2.4
          Nov 19, 2024 16:14:18.109288931 CET49754443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:18.110318899 CET49754443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:18.110335112 CET44349754160.153.0.9192.168.2.4
          Nov 19, 2024 16:14:18.110609055 CET49753443192.168.2.4160.153.0.9
          Nov 19, 2024 16:14:18.110630035 CET44349753160.153.0.9192.168.2.4
          Nov 19, 2024 16:14:19.052190065 CET49745443192.168.2.4142.250.185.228
          Nov 19, 2024 16:14:19.095365047 CET44349745142.250.185.228192.168.2.4
          Nov 19, 2024 16:14:19.525001049 CET4975080192.168.2.4199.232.214.172
          Nov 19, 2024 16:14:23.537543058 CET4975080192.168.2.4199.232.214.172
          Nov 19, 2024 16:14:30.366099119 CET49755443192.168.2.413.107.246.42
          Nov 19, 2024 16:14:30.366161108 CET4434975513.107.246.42192.168.2.4
          Nov 19, 2024 16:14:30.366238117 CET49755443192.168.2.413.107.246.42
          Nov 19, 2024 16:14:30.366772890 CET49755443192.168.2.413.107.246.42
          Nov 19, 2024 16:14:30.366787910 CET4434975513.107.246.42192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Nov 19, 2024 16:13:45.055516958 CET53627781.1.1.1192.168.2.4
          Nov 19, 2024 16:13:45.081971884 CET53549021.1.1.1192.168.2.4
          Nov 19, 2024 16:13:46.735496998 CET5283253192.168.2.41.1.1.1
          Nov 19, 2024 16:13:46.735655069 CET5447953192.168.2.41.1.1.1
          Nov 19, 2024 16:13:46.837877989 CET53544791.1.1.1192.168.2.4
          Nov 19, 2024 16:13:46.843179941 CET53528321.1.1.1192.168.2.4
          Nov 19, 2024 16:13:49.031505108 CET4942153192.168.2.41.1.1.1
          Nov 19, 2024 16:13:49.031688929 CET5239253192.168.2.41.1.1.1
          Nov 19, 2024 16:13:49.038501024 CET53494211.1.1.1192.168.2.4
          Nov 19, 2024 16:13:49.038541079 CET53523921.1.1.1192.168.2.4
          Nov 19, 2024 16:13:53.739370108 CET138138192.168.2.4192.168.2.255
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Nov 19, 2024 16:13:46.735496998 CET192.168.2.41.1.1.10xc78Standard query (0)www.amtso.orgA (IP address)IN (0x0001)false
          Nov 19, 2024 16:13:46.735655069 CET192.168.2.41.1.1.10x42dbStandard query (0)www.amtso.org65IN (0x0001)false
          Nov 19, 2024 16:13:49.031505108 CET192.168.2.41.1.1.10xe34Standard query (0)www.google.comA (IP address)IN (0x0001)false
          Nov 19, 2024 16:13:49.031688929 CET192.168.2.41.1.1.10x3291Standard query (0)www.google.com65IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Nov 19, 2024 16:13:46.837877989 CET1.1.1.1192.168.2.40x42dbNo error (0)www.amtso.orgamtso.orgCNAME (Canonical name)IN (0x0001)false
          Nov 19, 2024 16:13:46.843179941 CET1.1.1.1192.168.2.40xc78No error (0)www.amtso.orgamtso.orgCNAME (Canonical name)IN (0x0001)false
          Nov 19, 2024 16:13:46.843179941 CET1.1.1.1192.168.2.40xc78No error (0)amtso.org160.153.0.9A (IP address)IN (0x0001)false
          Nov 19, 2024 16:13:49.038501024 CET1.1.1.1192.168.2.40xe34No error (0)www.google.com142.250.185.228A (IP address)IN (0x0001)false
          Nov 19, 2024 16:13:49.038541079 CET1.1.1.1192.168.2.40x3291No error (0)www.google.com65IN (0x0001)false
          Nov 19, 2024 16:14:30.365117073 CET1.1.1.1192.168.2.40xe49No error (0)shed.dual-low.s-part-0014.t-0009.t-msedge.nets-part-0014.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
          Nov 19, 2024 16:14:30.365117073 CET1.1.1.1192.168.2.40xe49No error (0)s-part-0014.t-0009.t-msedge.net13.107.246.42A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:10:13:40
          Start date:19/11/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:2
          Start time:10:13:43
          Start date:19/11/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 --field-trial-handle=2540,i,10637750178900009282,3332602394498144869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Target ID:3
          Start time:10:13:46
          Start date:19/11/2024
          Path:C:\Program Files\Google\Chrome\Application\chrome.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.amtso.org/check-desktop-phishing-page/"
          Imagebase:0x7ff76e190000
          File size:3'242'272 bytes
          MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          No disassembly